Search Results - (( development authority function algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- function algorithm »
- data normalization »
- java »
-
1
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
Developing emergency application for LRT passengers with decision tree algorithm (RailAlert!) / Ezrren Natasha Baddru’l-Sham … [et al.]
Published 2023“…With geolocation and decision tree algorithms, this project aims to design and develop an emergency application for LRT passengers. …”
Get full text
Get full text
Book Section -
4
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…Through analysing the functional requirements of the system in the project, using MySQL database and Enhancer platform, the intelligent fault diagnosis management system of cloud computing power plant is designed and developed, which realises the functions of system modules such as system authority management, electronic equipment account, technical supervision, expert database, data centre. …”
Article -
5
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
6
Developing emergency application for LRT passengers with decision tree algorithm (RailAlert!) / Ezrren Natasha Baddru’l-Sham … [et al.]
Published 2023“…With geolocation and decision tree algorithms, this project aims to design and develop an emergency application for LRT passengers. …”
Get full text
Get full text
Book Section -
7
A new text-based w-distance metric to find the perfect match between words
Published 2020“…The core engine of the k-NN algorithm is the distance/similarity function. The performance of the k-NN algorithm varies with the selection of distance function. …”
Get full text
Get full text
Article -
8
Reliability fuzzy clustering algorithm for wellness of elderly people
Published 2019“…This proposed algorithm could support to improve the overall health of CKD patients through a variety of indicators such as physical functioning, mental health, vitality, and social functioning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Collaboration algorithms between intermediaries for supporting flexible supply chain management
Published 2013“…This is to facilitate process restructuring by adding or dropping the required services into the global execution schedule. The authors had develop the prototype of the IIMA and evaluate it with three other related systems in a simulated environment. …”
Get full text
Get full text
Get full text
Article -
11
Binary Coati Optimization Algorithm- Multi- Kernel Least Square Support Vector Machine-Extreme Learning Machine Model (BCOA-MKLSSVM-ELM): A New Hybrid Machine Learning Model for Pr...
Published 2024“…A coati optimization algorithm is introduced to select input scenarios. …”
Article -
12
Blind signature / Musfirah Mohd Ali
Published 2005“…In chapter 4 of this project explained the system requirements which are functional and nonfunctional requirements. This chapter also enlightened what kind of scheme that the author chose for this system. …”
Get full text
Get full text
Thesis -
13
Pseudo Randomized Search Strategy (PRSS*) of the ambiguity function mapping
Published 1998“…A combination between three methods of optimization, global random search and ambiguity function mapping produced an efficient search algorithm what the author called the Pseudo Randomized Search Strategy (PRSS). …”
Get full text
Get full text
Article -
14
Chaotic Immune Symbiotic Organisms Search algorithm for solving optimisation problem
Published 2023“…The performance of the proposed algorithm has been tested by solving several benchmark test functions. …”
Article -
15
Irrigation management based on reservoir operation with an improved weed algorithm
Published 2023Article -
16
-
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
18
Agreement options for negotiation on material location decision of housing development
Published 2020“…It will need the development of trade-off algorithms to analyze value of technical solution in real time. …”
Get full text
Get full text
Article -
19
MOBILE ROBOT
Published 2004“…These are to be achieved by Voronoi Diagram or Delaunay Triangulation method for mapping, and a combination of one or more of the Dijkstra, Bellman, Ford, Moore, Johnson, Floyd-Warshal, or A* algorithms for best path calculation. In some parts of the project especially the intelligent navigation algorithms, the author encountered many new ideas and theories which the author cannot fully understand. …”
Get full text
Get full text
Final Year Project -
20
Automated Maze Robot
Published 2011“…The findings in this project are the maze that is being used, the linear maze; the robot that is being used, the Pololu 3pi Robot; the algorithm that has been chosen to be implemented, the Wall Following Algorithm; the implementation of the project, how the robot operates; the tests that had been ran, the Fault Injection Test, the NonFunctional Test and the Integration Test; and the test results, the success rate and the failure rate. …”
Get full text
Get full text
Final Year Project
